{"id":24919,"date":"2023-01-12T15:16:00","date_gmt":"2023-01-12T15:16:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=24919"},"modified":"2026-03-03T04:46:05","modified_gmt":"2026-03-03T11:46:05","slug":"rollen-und-verantwortlichkeiten-im-soc-team","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/","title":{"rendered":"Die wichtigsten Rollen und Verantwortlichkeiten im SOC-Team"},"content":{"rendered":"\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cybersecurity padlock with encryption key symbolizing SOC threat protection\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1-300x182.webp 300w, https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1-1024x621.webp 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1-768x466.webp 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-01-12T15:16:00-07:00\">Jan. 12, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Key SOC Team Roles and Responsibilities<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-34d58fc2969ed55ee3a0abba463c5fed6c8ca4fd bs-section---default bs-section--blog-inner-table-of-contents  \"><style>.bs-section.bs-section-34d58fc2969ed55ee3a0abba463c5fed6c8ca4fd{ background-color: #eef4fa;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-3679660037b85198849d16e02f9e5dc94f149e6a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is-a-soc-team\">WHAT IS A SOC TEAM?<\/a><\/li>\n\n\n\n<li><a href=\"#What-does-a-SOC-team-do\">WHAT DOES A SOC TEAM DO?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-3679660037b85198849d16e02f9e5dc94f149e6a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#common-soc-roles\">COMMON SOC ROLES<\/a><\/li>\n\n\n\n<li><a href=\"#security-metrics-for-soc-teams\">SECURITY METRICS FOR SOC TEAMS<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Key%20SOC%20Team%20Roles%20and%20Responsibilities').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-team-roles-responsibilities%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Key%20SOC%20Team%20Roles%20and%20Responsibilities&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-team-roles-responsibilities%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-team-roles-responsibilities%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-team-roles-responsibilities%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>At the center of any successful&nbsp;Security Operations Center&nbsp;(<a href=\"\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>) are people. Security professionals such as <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analysts<\/a>, SOC managers and engineers protect and secure an enterprise\u2019s sensitive data and systems. But what roles make up a SOC team, and what roles and responsibilities does each person have? Let\u2019s explore how SOC teams work and the SOC team structure below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-soc-team\">What is a SOC Team?<\/h2>\n\n\n\n<p>The security operations center (<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>) team is made up of security professionals who are responsible for managing an organization&#8217;s security posture. The specific roles within a SOC may vary depending on the size and complexity of the organization, but there are some common SOC roles and&nbsp;responsibilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"What-does-a-SOC-team-do\">What are the SOC Team&#8217;s Roles and Responsibilities?<\/h2>\n\n\n\n<p>The SOC team is responsible for monitoring and maintaining an organization&#8217;s computer systems and networks to ensure they are secure and running smoothly. This can include tasks such as monitoring for security breaches, responding to security incidents, patching vulnerabilities, and implementing&nbsp;security&nbsp;policies and procedures. The SOC team may also be responsible for monitoring the performance of the organization&#8217;s systems and troubleshooting any issues that arise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"common-soc-roles\">Common SOC Roles<\/h2>\n\n\n\n<p>Every SOC is different, based on the size, industry and maturity of the organization. Here are the top common SOC roles:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOC Analyst &#8211; Tier 1, 2 and 3<\/h2>\n\n\n\n<p>The job of a security analyst \u2013 also called <a href=\"\/blog\/top-soc-analyst-challenges\/\">SOC analyst<\/a> \u2013 is to monitor an organization&#8217;s networks and systems for potential security threats, and respond to those threats as needed. They often use tools such as security information and event management (SIEM) systems and <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a> feeds to identify and assess potential threats. Analysts may also work closely with other teams, such as the <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\">incident response<\/a> team, to resolve those threats.<\/p>\n\n\n\n<p>Another one of the SOC analyst&#8217;s roles is also to utilize a Security Orchestration, Automation and Response (<a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR<\/a>) platform to manage cases and gather information in one location.<\/p>\n\n\n\n<p>There are typically three \u201ctiers\u201d of security analysts, based on experience and responsibilities:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tier-1-soc-analyst\">Tier 1 SOC Analyst<\/h3>\n\n\n\n<p> A Tier 1 security analyst\u2019s work focuses on alert triage and reporting. A typical day for Tier 1 SOC analysts is reviewing and categorizing security alerts and potential threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tier-2-soc-analyst\">Tier 2 SOC Analyst<\/h3>\n\n\n\n<p>Tier 2 security analysts are incident responders. These analysts review and respond to alerts that can\u2019t be handled by Tier 1 analysts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tier-3-soc-analyst\">Tier 3 SOC Analyst<\/h3>\n\n\n\n<p>The Tier 3 analyst is a qualified threat hunter. These SOC analysts proactively hunt and uncover complex threats within an organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-soc-engineer\">SOC Engineer<\/h2>\n\n\n\n<p>What is a SOC Engineer? A security engineer&#8217;s roles and responsibilities Security engineers are to design, implement and maintain the technical controls and defenses that are used to protect the organization&#8217;s assets and systems. This may include activities such as firewall and intrusion detection system configuration, access control implementation, and conducting security assessments and audits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOC Manager<\/h2>\n\n\n\n<p>The SOC Manager oversees the day-to-day operations of the SOC team and ensures that the organization&#8217;s systems and networks are secure and running smoothly.<\/p>\n\n\n\n<p>Some of the specific SOC Manager roles and responsibilities may include the following:<\/p>\n\n\n\n<div class=\"bs-div bs-div-7b790e08226e7858b39dc17c69c4ab5091174a90 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li>Setting priorities and managing resources<\/li>\n\n\n\n<li>Developing and implementing security policies and procedures<\/li>\n\n\n\n<li>Monitoring the performance of security systems and networks<\/li>\n\n\n\n<li>Managing <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\">incident response<\/a> processes<\/li>\n\n\n\n<li>Managing the team and communication with other departments<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Chief Information Security Officer (CISO)<\/h2>\n\n\n\n<p>A Chief Information Security Officer (CISO) is a senior-level executive who oversees an organization&#8217;s cybersecurity strategy and operations, often including more than the SOC team. The CISO falls within the enterprise leadership team and reports directly to the CEO or other executive-level manager.<\/p>\n\n\n\n<p>The specific responsibilities of a CISO may vary depending on the size and nature of the organization, but some common responsibilities may include the following:<\/p>\n\n\n\n<div class=\"bs-div bs-div-7b790e08226e7858b39dc17c69c4ab5091174a90 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li>Developing and implementing the organization&#8217;s cybersecurity strategy and policies<\/li>\n\n\n\n<li>Monitoring and analyzing the organization&#8217;s security posture, and identifying areas for improvement<\/li>\n\n\n\n<li>Working with senior management and other stakeholders to ensure that the organization&#8217;s security practices align with its business objectives and priorities<\/li>\n\n\n\n<li>Advising the organization on best practices and emerging trends in cybersecurity, and recommending investments in new tools and technologies<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-additional-soc-roles\">Additional SOC Roles<\/h2>\n\n\n\n<p>The above list is only some of the roles that can be found within a SOC team. There are a variety of other positions, especially in larger enterprise teams for advanced incident response and <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a>. Compliance roles are also seen within the SOC, such as compliance auditors. These team members ensure that an organization\u2019s security practices and procedures comply with industry and federal security regulations.<\/p>\n\n\n\n<div class=\"bs-div bs-div-7b790e08226e7858b39dc17c69c4ab5091174a90 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li><strong>Compliance Auditor:<\/strong> These team members ensure that an organization\u2019s security practices and procedures comply with industry and federal security regulations.<\/li>\n\n\n\n<li><strong>Threat Responder:<\/strong> This individual is responsible for actively engaging in <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/threat-hunting\/\">threat hunting<\/a> activities to detect, analyze, and respond to different <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cybersecurity attacks<\/a> facing the organization&#8217;s systems and infrastructure.<\/li>\n\n\n\n<li><strong>Forensic Investigator: <\/strong>These team members examine and analyze the structure, components, source, purpose, and extent of cybersecurity threats to determine how they have infiltrated and affected systems, aiding in incident response and mitigation efforts.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-metrics-for-soc-teams\">Security Metrics for SOC Teams<\/h3>\n\n\n\n<p>There are various <a href=\"\/blog\/soar-security-metrics\/\">security metrics<\/a> that a SOC team can use to measure the performance of their security processes. Here are a few examples:<\/p>\n\n\n\n<div class=\"bs-div bs-div-7b790e08226e7858b39dc17c69c4ab5091174a90 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li><strong>Mean Time to Detect (MTTD)&nbsp;<\/strong>and<strong>&nbsp;Mean Time to Respond (MTTR)<\/strong>: These metrics measure how long it takes for the SOC team to detect a security incident and how long it takes to respond to it.<\/li>\n\n\n\n<li><strong>Dwell time<\/strong>: Dwell time is the duration a threat actor has undetected access in a network until their completely removed.<\/li>\n\n\n\n<li><strong>False positive rate:<\/strong>&nbsp;This measures the percentage of alerts that are generated by security systems but are not actual security incidents. A low false positive rate is desirable as it means that the SOC team is not wasting time investigating non-issues.<\/li>\n\n\n\n<li><strong>Compliance rate:<\/strong>&nbsp;This looks at the percentage of security controls that are in compliance with industry regulations and standards.<\/li>\n\n\n\n<li><strong>Level of preparedness:&nbsp;<\/strong>This analyzes how effective your technology and tool implementation is. Avoid and eliminate gaps in controls that could be affecting your risk management program.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>It&#8217;s important to note that SOC metrics should be tailored to the specific organization and its unique security needs. These metrics can help organizations measure their security posture, identify areas of improvement and track the effectiveness of their security measures over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOC Roles and Responsibilities FAQs<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What does a SOC operator do?&nbsp;<\/h3>\n\n\n\n<p>A Security Operations Center (SOC) operator is responsible for protecting an organization against cyberattacks by detecting, analyzing, and responding to cybersecurity incidents. Their responsibilities include investigating incidents, escalating situations to appropriate parties within the <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>, implementing and managing security solutions and tools, monitoring alerts, preparing reports and dashboards, and resolving technical problems to ensure the security and integrity of the organization&#8217;s systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the Primary Responsibility of a Security Engineer in a SOC?<\/h3>\n\n\n\n<p>The primary responsibility of a Security Engineer in a SOC is to develop security policies and standards, manage and monitor systems enforcing these policies, and play a central role in safeguarding the organization&#8217;s digital infrastructure against cybersecurity threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How big should a SOC team be?&nbsp;<\/h3>\n\n\n\n<p>The size of a SOC team can vary based on factors such as the organization&#8217;s size, complexity, and threat landscape. Traditionally, SOC teams can range from a handful of experts to larger teams with multiple roles, depending on the evolving threat vectors of cybersecurity.<\/p>\n\n\n\n<p>No matter the size of the SOC team, these security professionals are critical to maintaining efficient and effective security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>)and incident response. Both small and large SOC teams can benefit from extra help responding to the thousands of daily alerts. Options include outsourced support with a Managed Security Services Provider (<a href=\"https:\/\/swimlane.com\/solutions\/industries\/mssps\/\">MSSP<\/a>) or implementing a security automation solution. Either way, SOC teams are a critical component of an organization\u2019s security and need all the help they can get.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"bs-div bs-div-719fd7cb1eec05e4b3774fb0305014c19d261f47 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-719fd7cb1eec05e4b3774fb0305014c19d261f47 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-27-at-11.55.03\u202fAM.png' class='img-fluid'   alt='TAG Cyber ROI analysis report on Swimlane Security Automation benefits' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-calculate-your-roi-with-swimlane-turbine\">Calculate your ROI with Swimlane Turbine<\/h2>\n\n\n\n<p>To help companies evaluate the potential financial impact of the potential investment, TAG Cyber conducted an extensive study on the Swimlane Security Automation Solution.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-f13351376f7ee282a513faa1cc21ac03fe15c986\"><style>.bs-pro-button-p-btn-f13351376f7ee282a513faa1cc21ac03fe15c986 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/roi-report\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea39b5a7276 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/national-read-across-america-day\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>M\u00e4rz 2, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>One team two team red team blue team<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea39b5a8275 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/black-hat-keynote-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Aug. 1, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Every security team is a software team now: Why you should attend the Black Hat keynote<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea39b5a927f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/devsecops-roles-responsibilites\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov. 20, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Roles &#038; Responsibilities of a DevSecOps Engineer<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-a453117a60b7f5f38bc5ff4f625c3332797c6884 bs-div---default bs-div--table-of-contents-right\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is-a-soc-team\">WHAT IS A SOC TEAM?<\/a><\/li>\n\n\n\n<li><a href=\"#What-does-a-SOC-team-do\">WHAT DOES A SOC TEAM DO?<\/a><\/li>\n\n\n\n<li><a href=\"#common-soc-roles\">COMMON SOC ROLES<\/a><\/li>\n\n\n\n<li><a href=\"#security-metrics-for-soc-teams\">SECURITY METRICS FOR SOC TEAMS<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":24967,"template":"","meta":{"_acf_changed":false,"show_custom_date":true,"custom_date":"2024-02-01T20:04:59.409Z","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-24919","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>6 Key SOC Team Roles &amp; Responsibilities<\/title>\n<meta name=\"description\" content=\"Find out more about the top Security Operations Center (SOC) roles, such a SOC analysts, CISOs and others.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/rollen-und-verantwortlichkeiten-im-soc-team\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Key SOC Team Roles and Responsibilities\" \/>\n<meta property=\"og:description\" content=\"Find out more about the top Security Operations Center (SOC) roles, such a SOC analysts, CISOs and others.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/rollen-und-verantwortlichkeiten-im-soc-team\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T11:46:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/\",\"name\":\"6 Key SOC Team Roles & Responsibilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/7soc-1.webp\",\"datePublished\":\"2023-01-12T15:16:00+00:00\",\"dateModified\":\"2026-03-03T11:46:05+00:00\",\"description\":\"Find out more about the top Security Operations Center (SOC) roles, such a SOC analysts, CISOs and others.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/7soc-1.webp\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/7soc-1.webp\",\"width\":1120,\"height\":679,\"caption\":\"Cybersecurity padlock with encryption key symbolizing SOC threat protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/soc-team-roles-responsibilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Key SOC Team Roles and Responsibilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 wichtige Rollen und Verantwortlichkeiten im SOC-Team","description":"Erfahren Sie mehr \u00fcber die wichtigsten Rollen im Security Operations Center (SOC), wie z. B. SOC-Analysten, CISOs und andere.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/rollen-und-verantwortlichkeiten-im-soc-team\/","og_locale":"de_DE","og_type":"article","og_title":"The Key SOC Team Roles and Responsibilities","og_description":"Find out more about the top Security Operations Center (SOC) roles, such a SOC analysts, CISOs and others.","og_url":"https:\/\/swimlane.com\/de\/blog\/rollen-und-verantwortlichkeiten-im-soc-team\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-03T11:46:05+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/","url":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/","name":"6 wichtige Rollen und Verantwortlichkeiten im SOC-Team","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp","datePublished":"2023-01-12T15:16:00+00:00","dateModified":"2026-03-03T11:46:05+00:00","description":"Erfahren Sie mehr \u00fcber die wichtigsten Rollen im Security Operations Center (SOC), wie z. B. SOC-Analysten, CISOs und andere.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/7soc-1.webp","width":1120,"height":679,"caption":"Cybersecurity padlock with encryption key symbolizing SOC threat protection"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/soc-team-roles-responsibilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Key SOC Team Roles and Responsibilities"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/24919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/24919\/revisions"}],"predecessor-version":[{"id":54416,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/24919\/revisions\/54416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/24967"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=24919"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=24919"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=24919"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=24919"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=24919"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=24919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}